Beefy Boxes and Bandwidth Generously Provided by pair Networks
good chemistry is complicated,
and a little bit messy -LW
 
PerlMonks  

Re: Spaghetti code...

by Perl Mouse (Chaplain)
on Oct 10, 2005 at 12:44 UTC ( #498787=note: print w/replies, xml ) Need Help??


in reply to Spaghetti code...

We can conclude from this poll that spagetti coders are much more efficient coders than non-spagetti coders. Just look at the numbers! Since as much code is past on to successors as there is code received from predecessors, we see that (as of this writing) the number of people receiving spagetti code out number the people passing on spagetti code by a factor of more than 2 (18 vs. 8).

Conclusion, every spagetti coder needs to be replaced by more than two non-spagetti coders, making spagetti coders a much more efficient work force.

People hiring programmers should take note.

Perl --((8:>* (Spagetti coder)

Replies are listed 'Best First'.
Re^2: Spaghetti code...
by mrborisguy (Hermit) on Oct 11, 2005 at 05:18 UTC

    Well said!

        -Bryan

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://498787]
help
Chatterbox?
[marto]: Sane Dots, chapter 13: ITIL never work :P
[marto]: sorry, bad pun of it'll :P
[Corion]: :-D
[Corion]: I think that ITIL is mostly to prevent people from doing harm to a system that basically runs unattended :)
[Corion]: Maybe you could reduce ITIL to a computer network, a man and a dog. The network runs the computations. The man is there to feed the dog. The dog is there to prevent the man from accessing the computers.
[marto]: from experience of this side of the fence, it's all about proving to people that you are ITIL compliant, then the client ignores logical processes anyway :P
[marto]: when you work on the outside, for a client, you can make them aware of the stupids, but they don' t always listen :/
[Corion]: Yeah, you can lead them to water, but it's illegal to drown them...
[Discipulus]: Here my solution marto: create a win fake machine insied AD. do a micro fake partition foreach remote partition you wont to monit. put a web server that acept from data from remote systems and full fake partition as needed. fake partition are Mb. ;=)

How do I use this? | Other CB clients
Other Users?
Others avoiding work at the Monastery: (12)
As of 2017-01-24 10:33 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    Do you watch meteor showers?




    Results (203 votes). Check out past polls.